Practice Free FC0-U71 Exam Online Questions
A user wants to connect to a home’s Wi-Fi from the basement but is unable to do so.
Which of the following is a potential cause of the issue?
- A . Interference
- B . Speed
- C . Synchronization
- D . Permission
A
Explanation:
Interference from walls, floors, or other electronic devices can weaken Wi-Fi signals, making it difficult to connect from locations like a basement.
Other options:
● Speed affects data transfer rate but not connection availability,
● Synchronization relates to timing, not connection,
● Permission would prevent connection if access credentials were incorrect, but the scenario implies a signal issue.
A user has concerns about device theft because they are working on a laptop at a local coffee shop.
Which of the following physical devices would be best to protect the laptop?
- A . Firewall
- B . Privacy shield
- C . USB lock
- D . Cable lock
D
Explanation:
A cable lock physically secures a laptop to a stationary object, helping to prevent theft in public spaces like coffee shops.
Other options:
● Firewall protects against network threats,
● Privacy shield prevents screen snooping,
● USB lock restricts port access but doesn’t prevent theft.
Which of the following is considered an output device?
- A . Smart TV
- B . Web camera
- C . Keyboard
- D . Microphone
A
Explanation:
A Smart TV is an output device as it displays video and audio to the user.
Web camera, keyboard, and microphone are input devices.
Which of the following can be used to stop an application that is no longer responding?
- A . Access management
- B . Task management
C Disk management - C . Device management
B
Explanation:
Task management (such as using Task Manager in Windows) allows users to view and stop unresponsive applications.
Other options:
● Access management controls user permissions,
● Disk management handles storage devices,
● Device management manages hardware components.
Which of the following can best protect a computer when an infected file has been downloaded?
- A . Anti-malware
- B . Firewall
- C . Patching
- D . Permissions
A
Explanation:
Anti-malware software is specifically designed to detect, block, and remove malicious files, making it the best defense when an infected file has been downloaded.
Other options:
● Firewall controls network traffic,
● Patching prevents exploitation of known vulnerabilities but doesn’t address already-downloaded malware,
● Permissions limit access but don’t actively remove threats.
Which of the following can be used to input commands for a computer to execute?
- A . Services
- B . Attributes
- C . Process
- D . Console
D
Explanation:
A console (or command-line interface) allows users to input commands for the computer to execute directly.
Other options:
● Services run background tasks,
● Attributes describe properties of objects,
● Process refers to a running program, not a command input method.
Which of the following must be included when backing up a workstation?
- A . Cloud-hosted files
- B . Application data
- C . Emails
- D . Installation files
B
Explanation:
When backing up a workstation, it’s essential to include application data, which contains the user’s work and settings.
Other options:
● Cloud-hosted files are usually backed up separately by the cloud service,
● Emails may be stored in the cloud or server,
● Installation files can typically be re-downloaded and are not critical for backup.
A user wants to access books and does not need printed, physical copies. The solution should be portable and lightweight.
Which of the following is the best solution?
- A . E-reader
- B . Servers
- C . External drive
- D . Workstation
A
Explanation:
An e-reader is portable, lightweight, and designed specifically for reading digital books, making it the best solution for accessing books without physical copies.
Other options:
● Servers and workstations are not portable devices,
● External drives store data but are not designed for reading books directly.
A user is trying to view a report via a hyperlink on a website. When the user clicks on the hyperlink, nothing happens.
Which of the following must be configured to view the report?
- A . Cache clearing
- B . Accessibility options
- C . Pop-up blocker
- D . Private browsing
C
Explanation:
If clicking a hyperlink does nothing, it’s often because a pop-up blocker is preventing the report from opening in a new window or tab. Disabling or configuring the pop-up blocker should resolve this.
Other options:
● Cache clearing refreshes stored data,
● Accessibility options adjust UI for usability,
● Private browsing restricts history but doesn’t block pop-ups by default.
Which of the following is an advantage of using a flat file for a small amount of data?
- A . Speed
- B . Scalability
- C . Concurrent users.
- D . Variety of data
A
Explanation:
Flat files are simple text-based databases that offer fast access and quick setup for small amounts of data, making speed their primary advantage.
They lack scalability, are not ideal for concurrent users, and are limited in handling a variety of data types.